flyer would not be wise. Additionally, before
scanning a code from a public venue, it would be wise
to simply feel the code to ensure that it is not a sticker,
which could indicate a security risk (“Scanning QR
Codes: Be safe”).
7 CONCLUSIONS
The general design of a QR code makes it easy and
cheap to create, as well as impossible to identify as a
“good” QR code versus a “harmful” one. But there
are steps that companies and individuals must assume
before simply scanning a random QR code and
trusting that it will not introduce malicious code or do
harm rather than good. Simply put, end users should
never trust any QR code and be suspicious and alert
to where any QR code may take them.
REFERENCES
Baharav, Z. & Kakarala, A, R. 2013. Visually significant
QR codes: Image blending and statistical analysis.
Multimedia and Expo (ICME), 2013 IEEE
International Conference on, 2013. IEEE, 1-6.
Bhaturkar, K. P. & Bagde, K. G. 2014. QR code based
digitized marksheet. International Journal of
Management, IT and Engineering, 4, 57.
Brindha, G. & Gopikaarani, N, 2014. Secure banking using
QR code.
ISO .2015. Available: http://www.iso.org/iso/catalogue_
detail?csnumber=43655 [Accessed 1 March 2016].
Jain, A. K., & Shanbhag, D,2012. Addressing security and
privacy risks in mobile applications. IT Professional,
(5), 28-33.
Jung, J.-H., Somerstein, R. & Kwon, E. S., 2012. Should i
scan or should i go?: Young consumers'motivations for
scanning qr code advertising. International Journal of
Mobile Marketing, 7.
Lin, Y.-H., Chang, Y.-P. & Wu, J.-L., 2013a. Appearance-
based QR code beautifier. Multimedia, IEEE
Transactions on, 15, 2198-2207.
Lo, H., 2014. Quick response codes around us: Personality
traits, attitudes toward innovation, and acceptance.
Journal of Electronic Commerce Research, 15, 35-39.
Malenkovich, 2015. Retrieved from https://blog.
kaspersky.com/qr-codes-convenient-dangerous/1115/
on April 8, 2015.
Moore, R., Lopes, J., 1999. Paper templates. In
TEMPLATE’06, 1st International Conference on
Template Production. SCITEPRESS.
Narang, S., Jain, V. & Roy, S. 2012. Effect of QR codes on
consumer attitudes. International Journal of Mobile
Marketing, 7, 52-64.
Narayanan, S. (2012), QR Codes and Security Solutions.
International Journal of Computer Science and
Telecommunications, 3(7), 69-72.
Okazaki, S., Li, H. & Hirose, M., 2012. Benchmarking the
use of QR code in mobile promotion. Journal of
Advertising Research, 52, 102-117.
Ozkaya, E., Ozkaya, H. E., Roxas, J., Bryant, F. & Whitson,
D., 2015. Factors affecting consumer usage of QR
codes. Journal of Direct, Data and Digital Marketing
Practice, 16, 209-224.
Rouillard, J., 2008. Contextual QR Codes. Proceedings of
the Third International Multi-Conference on
Computing in the Global Information Technology
(ICCGI 2008). IEEE.
Ryu, J. S. & Murdock, K. 2013., Consumer acceptance of
mobile marketing communications using the QR code.
Journal of Direct, Data and Digital Marketing
Practice, 15, 111-124.
Sago, B., 2011. The usage level and Effectiveness of Quick
Response (QR) codes for integrated marketing
communication purposes among college students.
International Journal of Integrated Marketing
Communications, 3, 7-17.
Sasaki, J., Shimomukai, H., Yoneda, T. & Funyu, Y., 2007.
Development of Designed QR Code. Frontiers in
Artificial Intelligence and Applications, 154, 290.
“Scanning QR Codes: Be Safe.” Retrieved from
http://beqrioustracker.com/scanning-qr-codes-be-safe/
on April 8, 2016.
Soman, N., Shelke, U. & Patel, S., 2013. Automated
Examination Using QR Code. International Journal of
Engineering and Advanced Technology, 2,
622-627.
Susono, H. & Shimomura, T., 2006. Using mobile phones
and QR codes for formative class assessment. Current
developments in technology-assisted education, 2,
1006-1010.
Vidas, T., Owusu, E., Wang, S., Zeng, C., Cranor, L, 2012
QRishing: The Susceptibility of Smartphone Users to
QR Code Phishing Attacks. CyLab: Carnegie Mellon
University, 12 pgs.
Wainwright, C., 2015. How to make a QR code in 4 quick
steps [Online]. Available: http://blog.hubspot.com/
blog/tabid/6307/bid/29449/How-to-Create-a-QR-
Code-in-4-Quick-Steps.aspx [Accessed 1 March 2016].
Zhou, Y. & Jiang, X., 2012. "Dissecting Android Malware:
Characterization and Evolution," 2012 IEEE
Symposium on Security and Privacy, San Francisco,
CA, pp. 95-109.